ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2201.08564
  4. Cited By
Hold On and Swipe: A Touch-Movement Based Continuous Authentication
  Schema based on Machine Learning

Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning

21 January 2022
Rushit Dave
Naeem Seliya
Laura Pryor
Mounika Vanamala
E. S. Boone
Jacob Mallet
ArXiv (abs)PDFHTML

Papers citing "Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning"

15 / 15 papers shown
Your device may know you better than you know yourself -- continuous
  authentication on novel dataset using machine learning
Your device may know you better than you know yourself -- continuous authentication on novel dataset using machine learning
Pedro Gomes do Nascimento
Pidge Witiak
Tucker MacCallum
Zachary Winterfeldt
Rushit Dave
149
1
0
06 Mar 2024
From Clicks to Security: Investigating Continuous Authentication via
  Mouse Dynamics
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Rushit Dave
Marcho Handoko
Ali Rashid
Cole Schoenbauer
136
1
0
06 Mar 2024
Software Repositories and Machine Learning Research in Cyber Security
Software Repositories and Machine Learning Research in Cyber Security
Mounika Vanamala
Keith Bryant
Alexander Caravella
115
1
0
01 Nov 2023
Secure Arcade: A Gamified Defense Against Cyber Attacks
Secure Arcade: A Gamified Defense Against Cyber AttacksInternational Journal of Computer Science & Information Technology (IJCSIT) (IJCSIT), 2023
Sean Loesch
Ryan Hrastich
Jordan Herbert
Ben Drangstveit
Jacob Weber
Mounika Vanamala
121
1
0
01 Nov 2023
Your Identity is Your Behavior -- Continuous User Authentication based
  on Machine Learning and Touch Dynamics
Your Identity is Your Behavior -- Continuous User Authentication based on Machine Learning and Touch Dynamics
Brendan Pelto
Mounika Vanamala
Rushit Dave
180
11
0
24 Apr 2023
Hybrid Deepfake Detection Utilizing MLP and LSTM
Hybrid Deepfake Detection Utilizing MLP and LSTM
Jacob Mallet
Natalie Krueger
Mounika Vanamala
Rushit Dave
165
17
0
21 Apr 2023
Leveraging Deep Learning Approaches for Deepfake Detection: A Review
Leveraging Deep Learning Approaches for Deepfake Detection: A ReviewInternational Conferences on Intelligent Systems, Metaheuristics & Swarm Intelligence (ICISMSI), 2023
Aniruddha Tiwari
Rushit Dave
Mounika Vanamala
180
15
0
04 Apr 2023
Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for
  Software Requirements and Design Specifications
Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications
Nicholas Lasky
Benjamin Hallis
Mounika Vanamala
Rushit Dave
Jim Seliya
113
5
0
10 Feb 2023
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVMInternational Conferences on Intelligent Systems, Metaheuristics & Swarm Intelligence (ICISMSI), 2023
Jacob Mallet
Laura Pryor
Rushit Dave
Mounika Vanamala
157
27
0
27 Jan 2023
Continuous User Authentication Using Machine Learning and Multi-Finger
  Mobile Touch Dynamics with a Novel Dataset
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset
Zachary Deridder
Nyle Siddiqui
Thomas Reither
Rushit Dave
Brendan Pelto
Naeem Seliya
Mounika Vanamala
159
12
0
27 Jul 2022
Using Deep Learning to Detecting Deepfakes
Using Deep Learning to Detecting Deepfakes
Jacob Mallet
Rushit Dave
Naeem Seliya
Mounika Vanamala
234
20
0
27 Jul 2022
Mitigating Presentation Attack using DCGAN and Deep CNN
Mitigating Presentation Attack using DCGAN and Deep CNN
Nyle Siddiqui
Rushit Dave
GANAAML
178
1
0
22 Jun 2022
Evaluation of a User Authentication Schema Using Behavioral Biometrics
  and Machine Learning
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine LearningComputer and Information Science (CIS), 2022
Laura Pryor
Jacob Mallet
Rushit Dave
Naeem Seliya
Mounika Vanamala
E. S. Boone
147
18
0
07 May 2022
A Close Look into Human Activity Recognition Models using Deep Learning
A Close Look into Human Activity Recognition Models using Deep LearningInternational Conferences on Computing, Networks and Internet of Things (ICCCNIT), 2022
Wei Zhong Tee
Rushit Dave
Naeem Seliya
Mounika Vanamala
HAI
217
20
0
26 Apr 2022
Exploration of Machine Learning Classification Models Used for
  Behavioral Biometrics Authentication
Exploration of Machine Learning Classification Models Used for Behavioral Biometrics AuthenticationInternational Conference on Computing: Theory and Applications (ICCTA), 2022
Sara Kokal
Laura Pryor
Rushit Dave
122
9
0
19 Apr 2022
1
Page 1 of 1